Overview
- Description
- The Seriously Simple Podcasting plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.5.0. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
- Source
- security@wordfence.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 6.1
- Impact score
- 2.7
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
Weaknesses
- security@wordfence.com
- CWE-79
Social media
- Hype score
- Not currently trending
CVE-2024-9667 Reflected Cross-Site Scripting in WordPress Plugin Seriously Simple Podcasting The Seriously Simple Podcasting plugin for WordPress has a Reflected Cross-Site Scripting vulnerability. This happens b... https://t.co/9paThUtrMi
@VulmonFeeds
5 Nov 2024
42 Impressions
1 Retweet
1 Like
1 Bookmark
0 Replies
0 Quotes
CVE-2024-9667 The Seriously Simple Podcasting plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the… https://t.co/Ciq0TLMfsq
@CVEnew
5 Nov 2024
293 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:castos:seriously_simple_podcasting:*:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "8EEEE9E7-B955-4BD3-A026-429411A9FD35", "versionEndExcluding": "3.6.0" } ], "operator": "OR" } ] } ]